Download presentation
Presentation is loading. Please wait.
1
Policy Development Milan Adams
2
Why do we need policies Tell us what to do Keep us safe
Better security
3
IT Specific policies Email Acceptable Use Policy (AUP)
Personal Identification Information (PII)
4
Policies Inform the user what he or she is allowed to , inter-company or intra-company Inform the users of what a phishing attack is and how to identify one and report it to the IT security staff Include a stipulation about how users should react if their account was compromised
5
AUP Describes the key points of special importance to users
Personal use Behavioral expectations Employees should be required to read and sign
6
PII Include all personal information about employees
How they are stored and encrypted What to do if there is a breech
7
PlayStation Network 2011 Confirmed around 77 million users accounts had breach Personal Identifiable Information was stolen Surpassed TJX hack Failed to notify users immediately Non encrypted information Usernames, passwords
8
PlayStation Network 2011 Possibly poor policy
Could be why Sony delayed Didn’t know what to do No procedures in place
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.